Received: by 2002:a05:6a10:af89:0:0:0:0 with SMTP id iu9csp1156925pxb; Fri, 21 Jan 2022 11:03:57 -0800 (PST) X-Google-Smtp-Source: ABdhPJz6IScEOXYX2pibg9zLycJBwrORUpzSFUA3fyzAX3W3Th5P7dC0rsgF3U2jvVkD3T0N5Ytt X-Received: by 2002:a17:902:ba87:b0:14a:f3ce:37b3 with SMTP id k7-20020a170902ba8700b0014af3ce37b3mr5288308pls.95.1642791836875; Fri, 21 Jan 2022 11:03:56 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1642791836; cv=none; d=google.com; s=arc-20160816; b=MBOJB/VzrWdnFbL4Cye8B2CGq2LqvpueAp2P9C9+mOThCaNdEqS5QuqJzs4QF1b7Un f3rMOqk8CRse4VeMidXQORjDqOmu+0oR5gTpJPLa+n5T95y2kqH5HsfVTqX+XnfTxKAd kzDWDLIjzXYMXgnbjbp+CJHWBOjT7dK+9DO87sL+1B23wV2zgQVOdcK1zOuZUQy5Ht1B QFXoyio4Nd4GK0Tzs0QJY0YQDpsu4M6GtTZECRM1fF7/hA6WocJ1grRNhyqq6uNf6Rju bzj02d9DFYrSnPzpGm9tf2Z9PsKxO4Xtfzs+PTxKo528iQYJMEHP+5SAvMM7toMe2qOA 6OMA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:references:in-reply-to:message-id :date:subject:cc:to:from; bh=YUN4Evn30FjVS+iZ6ftmiI1ndSXyTisFp8hq1/8XwZE=; b=afIrxF+2s3q8me2BAjTRiP9U6+j+z2yy5pUFgQva5uOmcgbVhUdyg6PjK4hPlmmzI9 GBbveTco5Deg42G/tsQENDXXrS+rzgJKBHAAh1r/SFmz1Etp+JUIwxYnpyOXpGUYxUlK OkIYmmLOZ/vHUEdo7wqE8zAsSf54UMMJQW+ZSaT5r2Ei8KQ/iIaIzRRgiaBonuhT93lW u6fU2dPjZm/sI8VovEArrrnpT6hVAFq9EHwvnCz3LTjkqJCWP1lswf/NUdoZxOIHpOJT g+4lqCpynMvjnfinxY9y0AM0bWYPheG8ytC7gmWQrfrbUEJNx1wBgSaeQqoH2dvTw9Ku YHWw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=mediatek.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id d24si2483123pgd.79.2022.01.21.11.03.44; Fri, 21 Jan 2022 11:03:56 -0800 (PST) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=mediatek.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1352780AbiASJYq (ORCPT + 99 others); Wed, 19 Jan 2022 04:24:46 -0500 Received: from mailgw02.mediatek.com ([210.61.82.184]:40658 "EHLO mailgw02.mediatek.com" rhost-flags-OK-FAIL-OK-FAIL) by vger.kernel.org with ESMTP id S1352766AbiASJYo (ORCPT ); Wed, 19 Jan 2022 04:24:44 -0500 X-UUID: 1ac59f4b3b1f4caa826e0ff51a75370e-20220119 X-UUID: 1ac59f4b3b1f4caa826e0ff51a75370e-20220119 Received: from mtkexhb01.mediatek.inc [(172.21.101.102)] by mailgw02.mediatek.com (envelope-from ) (Generic MTA with TLSv1.2 ECDHE-RSA-AES256-SHA384 256/256) with ESMTP id 1307031794; Wed, 19 Jan 2022 17:24:41 +0800 Received: from mtkexhb02.mediatek.inc (172.21.101.103) by mtkmbs07n2.mediatek.inc (172.21.101.141) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Wed, 19 Jan 2022 17:24:40 +0800 Received: from mtkcas10.mediatek.inc (172.21.101.39) by mtkexhb02.mediatek.inc (172.21.101.103) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Wed, 19 Jan 2022 17:24:40 +0800 Received: from mtksdccf07.mediatek.inc (172.21.84.99) by mtkcas10.mediatek.inc (172.21.101.73) with Microsoft SMTP Server id 15.0.1497.2 via Frontend Transport; Wed, 19 Jan 2022 17:24:40 +0800 From: Miles Chen To: CC: , , , , , , , , , Subject: Re: [PATCH] lib/crypto: blake2s: fix a CFI failure Date: Wed, 19 Jan 2022 17:24:40 +0800 Message-ID: <20220119092440.4045-1-miles.chen@mediatek.com> X-Mailer: git-send-email 2.18.0 In-Reply-To: References: MIME-Version: 1.0 Content-Type: text/plain X-MTK: N Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org hi, >Thanks for the patch. Could you let me know which architecture and >compiler this was broken on? If I had to guess, I'd wager arm32, and >you hit this by enabling optimized blake2s? Actually, I am merging android-common tree and test our device. I use arm64 and clang-r437112b. I'm not sure which option is the right one, grep 'BLAKE' .config shows: CONFIG_CRYPTO_BLAKE2B=y # CONFIG_CRYPTO_BLAKE2S is not set # CONFIG_CRYPTO_LIB_BLAKE2S_GENERIC=y and... I found that my patch breaks arm32 build, sorry for that. >If so, I'm not sure the problem is with weak symbols. Why should CFI >break weak symbols? Rather, perhaps the issue is that the function is >defined in blake2s-core.S? Are there some CFI macros we need for that >definition?